Resubmissions

31-03-2024 21:21

240331-z7jbwsda39 10

31-03-2024 21:18

240331-z5rv9ace3z 10

Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2024 21:21

General

  • Target

    5e6114efe56d6a4cb3b9efaeeb18a2c1_JaffaCakes118.js

  • Size

    24KB

  • MD5

    5e6114efe56d6a4cb3b9efaeeb18a2c1

  • SHA1

    6ff4182105261e965ad8f3b373c98a9cf7b4d1bb

  • SHA256

    e1c16f7c77280f307b671baaf7409b6ca7772bcddec3d3bd2b667034df320e27

  • SHA512

    b4f0ccbee4c3e891f085ef6108d36b2f65c7efb3d01bb28ed848072bb25426d831df24f7651a41067b34311b1e2b30c381ba456ca8f2a7535e8b687ac702d105

  • SSDEEP

    384:Jm3uw3bKnVw/cj2i3TvskXpuYno5w9FW0z7KQuDFPlglpxivySfj/MGznhfd1:klrKOfiYkXpNn4wHjz0gT6BP

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\5e6114efe56d6a4cb3b9efaeeb18a2c1_JaffaCakes118.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\IgOMTiUSwr.js"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\IgOMTiUSwr.js

    Filesize

    8KB

    MD5

    e3e02044f9c52b7ccc612c7018a6e8cb

    SHA1

    4b09da4abe3f8d626043a3302f607622496c4df5

    SHA256

    d6fda24f2c7f287aefe429557a7b6dc2c4b3f6e8c04fe753352dc79cf6d14938

    SHA512

    8e491eef71548162d30d1e11bf09ec2a3d1223c2b1a5314ff6939dcfc5e261da5ea62e3a201c9e07c0d965df82db489907513cfa57e0b8b963e4cb7d3d2e2e85